AUTHENTICATED CONTROL STACKS
    1.
    发明申请
    AUTHENTICATED CONTROL STACKS 有权
    认证控制堆

    公开(公告)号:US20160224784A1

    公开(公告)日:2016-08-04

    申请号:US14612067

    申请日:2015-02-02

    Abstract: A method of producing a control stack includes: writing a plurality of control information entries into a control stack buffer that is internal to a processor in response to one or more function calls; and in response to the control stack buffer being full and receiving a further function call, writing: the plurality of control information entries to an external memory that is external to the processor; and a further control information entry, corresponding to the further function call, to the control stack buffer.

    Abstract translation: 一种产生控制堆栈的方法包括:响应于一个或多个功能调用将多个控制信息条目写入处理器内部的控制堆栈缓冲器; 并且响应于所述控制堆栈缓冲器已满并接收另外的功能调用,将所述多个控制信息条目写入到处理器外部的外部存储器; 以及对应于进一步的功能调用的另一个控制信息条目提供给控制栈缓冲器。

    DETECTING VOICE-BASED ATTACKS AGAINST SMART SPEAKERS

    公开(公告)号:US20200020330A1

    公开(公告)日:2020-01-16

    申请号:US16036538

    申请日:2018-07-16

    Abstract: Techniques for operating a voice-activated computing device are provided. These techniques can be used to prevent voice-based attacks on such devices. An example method according to these techniques includes receiving audio content comprising a voice command, monitoring electromagnetic (EM) emissions using an EM detector of the voice-activated computing device, determining whether the audio content comprising the voice command was generated electronically or was issued by a human user based on the EM emissions detected while receiving the audio content comprising the voice command, and preventing the voice command from being executed by the voice-activated computing device responsive to determining that the voice command was generated electronically.

    TECHNIQUES FOR INSTRUCTION PERTURBATION FOR IMPROVED DEVICE SECURITY

    公开(公告)号:US20220237283A1

    公开(公告)日:2022-07-28

    申请号:US17160769

    申请日:2021-01-28

    Abstract: Methods, systems, and devices for techniques for instruction perturbation for improved device security are described. A device may assign a set of executable instructions to an instruction packet based on a parameter associated with the instruction packet, and each executable instruction of the set of executable instructions may be independent from other executable instructions of the set of executable instructions. The device may select an order of the set of executable instructions based on a slot instruction rule associated with the device, and each executable instruction of the set of executable instructions may correspond to a respective slot associated with memory of the device. The device may modify the order of the set of executable instructions in a memory hierarchy post pre-decode based on the slot instruction rule and process the set of executable instructions of the instruction packet based on the modified order.

    CODE POINTER AUTHENTICATION FOR HARDWARE FLOW CONTROL
    5.
    发明申请
    CODE POINTER AUTHENTICATION FOR HARDWARE FLOW CONTROL 有权
    硬件流量控制代码指示器认证

    公开(公告)号:US20160110545A1

    公开(公告)日:2016-04-21

    申请号:US14517572

    申请日:2014-10-17

    CPC classification number: G06F21/56 G06F21/52 G06F21/554

    Abstract: Techniques for enforcing flow control of a software program in a processor are provided. An example method according to these techniques includes analyzing program code of the software program to identify a code pointer in the program code, generating an authentication tag based on the code pointer, and modifying the code pointer in the program code with the authentication tag to generate a tagged code pointer.

    Abstract translation: 提供了用于在处理器中执行软件程序的流控制的技术。 根据这些技术的示例性方法包括分析软件程序的程序代码以识别程序代码中的代码指针,基于代码指针生成认证标签,并用认证标签修改程序代码中的代码指针以产生 一个标记的代码指针。

Patent Agency Ranking